Universiti Teknikal Malaysia Melaka

Displaying 1-40 of 62 results

In order to deal with security of Mobile Cloud Computing (MCC) authentication plays an important role. It is aimed to verify user's identity when they wish to request services via the internet through Cloud Service Provider (CSP). Personal identification number is the most common mechanism for authentication in mobile devices;...

The N-screen service has evolved from the OSMU (One Source Multi-Use) method of using a same content on various devices to the ASMD (Adaptive Source Multi-Device) method of different using contents suitable for different devices. Although there is an increase in consumers' need, there is dearth of academic research dealing...

In this paper, the authors discuss iris recognition, which is accepted as one of the best biometric methods for identifying an individual. A comparative analysis is done for eight algorithms, namely DCWT, FWT, SWT, CWT, DB, Complex dual tree, Haar wavelet and wavelet packet for extracting the feature from iris...

Instant Messaging (IM) is one of the popular applications for real-time communication. Along with its popularity the threats that target instant messaging also rising. Some studies have been conducted to improve the message confidentiality of the instant messaging, which do not possess by most existing IM. The purpose of this...

With the rise of Internet banking, phishing has become a major problem in online banking systems. Over time, highly evolved phishing attacks, such as active phishing, have emerged as a serious issue. Thus, the authors suggest two server authentication schemes based on SSL/TLS to protect Internet banking customers from phishing...

The number of mobile web service users has increased steadily as wireless mobile web-based services have diversified, and existing services are also being provided by web-based interfaces on Smartphone's. However, mobile web users' information can be leaked to attackers as mobile web services are interrupted by SQL injection and/or parameter...

The agile development approach to systems development is fundamentally based on the agile manifesto published in 2001 by a group of independent consultants and practitioners. Twelve principles supporting the agile manifesto were elaborated in support. Following the spirit of the agile manifesto, this paper proffers the agile project management manifesto....

Documentation is one of the key quality factors in software development. However, many developers are still putting less effort and less priority on documentation. To them writing documentation during project development is very tedious and time consuming. As a result, the documentation tends to be significantly out-dated, poor quality and...

Cloud Computing (CC) has been recognized and gained significant importance as an approach that can be used to save the energy of resources being used by organizations. CC is crucial in virtualization; that is helpful to reduce the use of the number of power consuming servers. Virtualization itself is being...

Enterprise Resource Planning (ERP) systems are becoming mature technologies to support inter- and intra-company business processes. However, one of the factors frequently cited as the major reason for the failure of ERP system in post implementation is \"User Resistance\". ERP implementation doesn't finish after Go-Live, instead the real test of...

Due to socio-technical reasons, cloud services are usually deployed in a heterogeneous network where both human and non-human actors are equally important in the process of technology adoption. Close examination of Information Systems adoption and diffusion theories shows that human and non-human actors, as the major elements in every heterogeneous...

Modernization of power usage and design is demanding for new control and operation strategies of the smart grid. The changes in load control system coupled with the variable and stochastic nature of renewable energy integrated in the smart grid offers a new set of challenges in balancing generation and consumption....

The Microsoft-based mobile sales management application is a sales force management application that currently running on Windows Mobile 6.5. It handles sales-related activity and cuts down the administrative task of sales representative. Then, Windows launch a new mobile operating system, Windows Phone and stop providing support to Windows Mobile. This...

Enterprise Resource Planning (ERP) implementations in the context of small medium size enterprises are discussed in this paper. It is essential for small businesses to success implementation an ERP system to maintain control of their risks. ERP implementation is costly and risky for small and medium enterprises. Paper identified from...

Intrusion detection continues to be an active research field. Even after 20 years of research, the intrusion detection community still faces several difficult problems. Detecting unknown patterns of attack without generating too many false alerts remains an unresolved problem. Although recently, several results have shown that there is a potential...

The globalization of businesses and the germination of customer satisfaction importance induced a profound transfer from transitional to relational marketing, together with the introduction of relationship marketing concept. To surmount this transition, business process improvement is acknowledged as one of the prevailing methods to conduct changes in organizations. Concerning the...

With the growing of wireless network technology researchers find that Wireless Sensor Network (WSN) is one the newest technology to make the life more comfortable and interesting. Security is needed to ensure the communication between the sensor node which is already a part from the same network and not outside...

Cloud Computing (CC) is becoming popular as the latest technology in the infrastructure of the computing world. The CC allows the users to make use of the resources when needed. Mobile Cloud Computing (MCC) combines the cloud computing concept into a mobile setting and manages to deter barriers associated with...

Hybrid Medium Access Control (MAC) design in Wireless Sensor Network (WSN) brings a new research challenge nowadays. Hybrid MAC gives significant improvement in network performance especially in terms of energy efficiency and reliability of the network. Some of the data are sensitive to loss in the medium such as video...

Cloud computing is an emerging computing model where IT and computing operations are delivered as services in highly scalable and cost effective manner. Recently, embarking this new model in business has become popular. Companies in diverse sectors intend to leverage cloud computing architecture, platforms and applications in order to gain...

Cloud computing has become a controversial subject in the future of computer networks. Furthermore, it has emerged as a major information and communications technology leaning. The most important problem in cloud computing environment that enterprises are focused on is security concerns. One of the challenges in cloud environment is to...

Cloud computing is a revolution in IT technology by providing a shared pool of virtualizes resources for its users to pay as they use. This technology is based on two crucial concepts as virtualization and abstraction, which increased the ability of on demand access through the available resources in the...

Model-driven development uses models to represent system artifacts to improve the visibility of the system towards the real world. The development of models is underlying in the Meta-Object Facility (MOF) standard in order to define the building concepts of metamodel and models. However, these concepts, especially within MOF standard, are...

In most of the existing geographical forwarding methods of Vehicular Ad hoc NETwork (VANET), a node periodically sends "Hello" messages to determine the positional information of its direct neighbors. Each node stores and maintains more or less accurate information of its direct neighbors in a table. However, due to high...

Cloud computing is an emerging computing model, which changed the whole picture that distributed computing used to present. Although, Cloud offers great benefits, it introduces a myriad of threats. These threats must be overcome in order to benefit fully from this new computing exemplar. This paper reveals benefits of exploiting...

Security and Privacy concerns in Radio Frequency IDentification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this paper,...

Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive...

Developing a system architecture that satisfies the functional requirements and keeping the quality attributes high is still an open challenge. The task of selecting the optimal combination and redundancy levels of components (which is known as RAP problem) that meet system-level constraints is hard since each one of these alternatives...

The redundant components' nodes are widely used as design tactic to improve the reliability of complex embedded systems. The challenge is that; the obtained solution might not be sufficient because it demands high cost, and the system might be failed if the predicted cost does not estimated reasonably. Many publications...

Conventional Supply Chain Management (SCM) considered only three stages: pre-manufacture, manufacture and use, while the present enterprises and specially the Small and Medium sized Enterprises (SMEs) need to consider the Sustainable Supply Chain Management (SSCM) for competitive and stability in the market. It means this chain have to consider from...

The construction industry has been characterised by fragmentation, lack of integration and complexities in processes and activities. These characteristics could threaten the delivery of project objectives which could ultimately have a negative impact on construction project success. The construction industry is associated with numerous activities, processes, organizations and individuals. Improving...

In this paper, the authors present a survey of intrusion detection schemes in WSNs. First, they present the similar works and show their differences from this work. After that, they outline the fundamentals of intrusion detection in WSNs, describing the types of attacks and state the motivation for intrusion detection...

This paper present the authors' mobile u-navigation system. This approach utilizes hybridization of wireless local area network and Global Positioning System internal sensor which to receive signal strength from access point and the same time retrieve Global Navigation System Satellite signal. This positioning information will be switched based on type...

The fragmentation, poor integration and adversarial relationships among players in the construction industry has been one of the main barriers of the successful construction project delivery contributing to negative influence on project objectives. There are many processes, organizations and people involved within the construction industry. Enhanced collaboration with construction parties...

As concerns about security in networking and communication systems rise with their rapid technology advancements, the need for more reliable and stronger user authentication techniques has also increased. Traditional security methods such as personal identification number, password, and key smart cards are proving to be more and more inadequate, especially...

This paper is to determine the correlation of social networks with Information and Communication Technology (ICT) and the rate of user satisfaction and loyalty in social networks, An Investigation concerning the effects of Information Technology (IT) in this field will lead to development in services that all social networks prepare...

The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions Detection Systems (IDSs) are systems that try to detect attacks as they occur or after the attacks...

In the recent years, video streaming over wireless networks has become very popular. Users can join the network easily and move from one point to another with no restriction. On the other hand, there are some problems in providing smooth video playback in these nodes due to time-varying channels, obstacles...

In this paper, a watermark hiding scheme for copyright protection of sensitive images is proposed. The concept of Visual Cryptography is used, so that the original host image is not altered. The proposed scheme aims at improving the security of the related schemes. The scheme also reduces the size of...

This paper investigates the characteristics of wind-induced slow fading in fixed wireless links where the first Fresnel Zone is partially obstructed by trees. Based on results from long term propagation measurements at 5.8GHz, the authors show that, besides seasonal and fast fading, the received signal in foliated fixed wireless links...

As concerns about security in networking and communication systems rise with their rapid technology advancements, the need for more reliable and stronger user authentication techniques has also increased. Traditional security methods such as personal identification number, password, and key smart cards are proving to be more and more inadequate, especially...

Developing a system architecture that satisfies the functional requirements and keeping the quality attributes high is still an open challenge. The task of selecting the optimal combination and redundancy levels of components (which is known as RAP problem) that meet system-level constraints is hard since each one of these alternatives...

The redundant components' nodes are widely used as design tactic to improve the reliability of complex embedded systems. The challenge is that; the obtained solution might not be sufficient because it demands high cost, and the system might be failed if the predicted cost does not estimated reasonably. Many publications...

This paper is to determine the correlation of social networks with Information and Communication Technology (ICT) and the rate of user satisfaction and loyalty in social networks, An Investigation concerning the effects of Information Technology (IT) in this field will lead to development in services that all social networks prepare...

The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions Detection Systems (IDSs) are systems that try to detect attacks as they occur or after the attacks...

In this paper, a watermark hiding scheme for copyright protection of sensitive images is proposed. The concept of Visual Cryptography is used, so that the original host image is not altered. The proposed scheme aims at improving the security of the related schemes. The scheme also reduces the size of...

This paper present the authors' mobile u-navigation system. This approach utilizes hybridization of wireless local area network and Global Positioning System internal sensor which to receive signal strength from access point and the same time retrieve Global Navigation System Satellite signal. This positioning information will be switched based on type...

In most of the existing geographical forwarding methods of Vehicular Ad hoc NETwork (VANET), a node periodically sends "Hello" messages to determine the positional information of its direct neighbors. Each node stores and maintains more or less accurate information of its direct neighbors in a table. However, due to high...

Web service selection which is specified to evaluate and select the best candidate from discovered Web services became one of the most significant topics in recent research on Service Oriented Architecture (SOA). In this paper, the authors propose a hybrid approach to solve Web service selection problem. First, they apply...

A novel two layered UWB antenna is proposed and designed to resonate at the full range of UWB frequencies' spectrums from 3.1 GHz up to 10.6 GHz, well below -14.0dB reference levels of return loss. The size of the UWB antenna is small, with width of 31.0 mm and length...

This paper presents an unconventional methodology in examining the extent of vegetation blockage effects imposed on Near Line-Of-Sight (NLOS) fixed wireless links based on Institute of Electrical and Electronics Engineers (IEEE) 802.11a Wireless Local Area Network (WLAN) standard operating at frequency 5.8 GHz of Unlicensed National Information Infrastructure (UNII) band....

In this paper, the authors looks into coexistence and sharing between systems as a recently critical issue due to emerging new technologies and spectrum scarcity. At WRC-07, ITU-R allocated 3400-3600 MHz band for the coming Fourth Generation (4G) or IMT-Advanced on a co-primary basis along with existing Fixed Wireless Access...

Model-driven development uses models to represent system artifacts to improve the visibility of the system towards the real world. The development of models is underlying in the Meta-Object Facility (MOF) standard in order to define the building concepts of metamodel and models. However, these concepts, especially within MOF standard, are...

Hybrid Medium Access Control (MAC) design in Wireless Sensor Network (WSN) brings a new research challenge nowadays. Hybrid MAC gives significant improvement in network performance especially in terms of energy efficiency and reliability of the network. Some of the data are sensitive to loss in the medium such as video...

With the growing of wireless network technology researchers find that Wireless Sensor Network (WSN) is one the newest technology to make the life more comfortable and interesting. Security is needed to ensure the communication between the sensor node which is already a part from the same network and not outside...

Intrusion detection continues to be an active research field. Even after 20 years of research, the intrusion detection community still faces several difficult problems. Detecting unknown patterns of attack without generating too many false alerts remains an unresolved problem. Although recently, several results have shown that there is a potential...

A wireless mesh network is a multi-hop network consisting of nodes called mesh routers and mesh clients. The network is self-organized and it is capable of covering a large geographical area for purposes like data gathering, communication and information processing. For communication, the nodes in the network are allocated with...

Data centers form a key part of the infrastructure upon which a variety of information technology services are built. They provide the capabilities of centralized repository for storage, management, networking and dissemination of data. With the rapid increase in the capacity and size of data centers, there is a continuous...

In the recent years, video streaming over wireless networks has become very popular. Users can join the network easily and move from one point to another with no restriction. On the other hand, there are some problems in providing smooth video playback in these nodes due to time-varying channels, obstacles...

Cloud computing is an emerging computing model, which changed the whole picture that distributed computing used to present. Although, Cloud offers great benefits, it introduces a myriad of threats. These threats must be overcome in order to benefit fully from this new computing exemplar. This paper reveals benefits of exploiting...

Due to socio-technical reasons, cloud services are usually deployed in a heterogeneous network where both human and non-human actors are equally important in the process of technology adoption. Close examination of Information Systems adoption and diffusion theories shows that human and non-human actors, as the major elements in every heterogeneous...

The Controller Area Network (CAN) has long been used for automotive applications as a method to enable robust serial communication. The goal was to make the system more reliable, safe and efficient while decreasing wiring harness weight and complexity. Based on these factors, a CAN bus project was carried out...

The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such...

Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is...

Malware is a type of malicious program that replicate from host machine and propagate through network. It has been considered as one type of computer attack and intrusion that can do a variety of malicious activity on a computer. This paper addresses the current trend of malware detection techniques and...

Wireless ad hoc nodes are freely and dynamically self-organize in communicating with others. Each node can act as host or router. However, it actually depends on the capability of nodes in terms of its current power level, signal strength, number of hops, routing protocol, interference and others. In this research,...

Communication in wireless network is quite susceptible to mobility, nodes capacity and power consumption level. These might contributes to the major problem of TCP performance degradation where there are highly potential of packet loss and packet reordering. In this paper, the authors manage to observe the impact of packet behavior...

Test coverage is an important deliverable of a software testing process. Many papers have been published detailing on how to get coverage information by either code based testing (white box) or requirement based testing (black box). This paper describes a gray box analyzer prototype, GRAYzer that the authors developed to...

Security and Privacy concerns in Radio Frequency IDentification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this paper,...

Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive...

This paper discusses a curriculum approach that will give emphasis on practical sessions of teaching network security subjects in information and communication technology courses. As one is well aware, the need to use a practice and application oriented approach in education is paramount. Research on active learning and cooperative groups...

There is no doubt that in the 21st century Malaysia had entered a new era of globalization. Among others, Malaysia is faced with the new challenge especially in adoption with new business marketing through internet. The terms formerly known as e-commerce, is become a popular platform for the company in...

The globalization of businesses and the germination of customer satisfaction importance induced a profound transfer from transitional to relational marketing, together with the introduction of relationship marketing concept. To surmount this transition, business process improvement is acknowledged as one of the prevailing methods to conduct changes in organizations. Concerning the...

Consumers for years have put their trust in physical means of proving personal identity. However, with the advent of Smart Cards, creating the same sense of trust in the security world is a challenge. Smart Cards, carrying digital signatures, private keys and certificates, offer an approach to trust in the...

Cloud computing has become a controversial subject in the future of computer networks. Furthermore, it has emerged as a major information and communications technology leaning. The most important problem in cloud computing environment that enterprises are focused on is security concerns. One of the challenges in cloud environment is to...

Cloud computing is a revolution in IT technology by providing a shared pool of virtualizes resources for its users to pay as they use. This technology is based on two crucial concepts as virtualization and abstraction, which increased the ability of on demand access through the available resources in the...

Cloud computing is an emerging computing model where IT and computing operations are delivered as services in highly scalable and cost effective manner. Recently, embarking this new model in business has become popular. Companies in diverse sectors intend to leverage cloud computing architecture, platforms and applications in order to gain...

Information Security (InfoSec) Surveys conducted worldwide show that the number and type of InfoSec attacks is expanding daily. This is verified and validated through a survey discussed in this paper. The paper asks a number of questions concerning InfoSec issues, outlines a survey designed to answer these questions, and then...

In this paper, the authors present a survey of intrusion detection schemes in WSNs. First, they present the similar works and show their differences from this work. After that, they outline the fundamentals of intrusion detection in WSNs, describing the types of attacks and state the motivation for intrusion detection...

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?